This course will cover how to respond to a network security incident, The Incident Response Life Cycle, Legal and ethical considerations in terms of accessing data during a breach, and How an organization can use data from past incidents to strengthen their defenses This course does not cover Penetration Testing or Hacking Back.
Module 1 – Preparation
Module 2 – Detection & Analysis
Module 3 – Containment
Module 4 – Eradication & Recovery
Module 5 – Post-Incident Activity And
Module 6 – Review